Cybersecurity SLAs: Managing Requirements at Arm’s Length

The growth of outsourced or hosted services such as cloud computing has created new challenges in managing cyber security requirements. This call to action, drawing on the presenters’ research with hundreds of organizations, will explore the need for effective “cyber security SLAs.” The discussion will propose benefits of a cyber SLA, and how they might be established and effectively managed.

Upcoming Conferences

EMC2, EMC, RSA and their respective logos are registered
trademarks or trademarks of EMC Corporation in the
United States and other countries. All other trademarks
used herein are the property of their respective owners.